Growing demand for AI-skilled cyber specialists  

 AI is increasingly at the heart of organisations’ digital transformation journeys – whether that’s to drive up efficiencies, generate powerful insights from data, delight customers, or supercharge internal productivity. Read more »

Home Office ‘back door’ seeks world-wide access to Apple iCloud users’ data, court documents confirm

A court filing sates a government order against Apple would give it the capability to access communications and ‘metadata’ of customers using Apple’s iCloud service anywhere in the world... Read more »

Home Office ‘backdoor’ seeks worldwide access to Apple iCloud users’ data, court documents confirm

A court filing states that a government order against Apple would give it the capability to access communications and metadata of customers using the iCloud service anywhere in the... Read more »

How to manage Active Directory security

Understanding prevention and recovery steps is crucial for managing attacks on Active Directory Read more »

AI and backup: How backup products leverage AI

We look at how AI helps with backup, from AI analysis of backup jobs and their integrity through natural language support functionality to ransomware and anomaly detection Read more »

UK cyber security centre helps expose China-based cyber campaign

GCHQ cyber security centre and its international partners release details of malicious cyber activity linked to Chinese businesses Read more »

What is network security? Definition and best practices

Network security encompasses all the steps taken to protect the integrity of a computer network and the data within it. Read more »

Incident response planning cuts the risk of claiming on cyber security insurance

Proper attention to incident response planning is emerging as a core cyber control when it comes to reducing the risk of having to claim on cyber security insurance, according... Read more »

Ransomware activity levelled off in July, says NCC

Ransomware levels held steady in the month of July, although the risk remained as persistent as ever Read more »

Three new Citrix NetScaler zero-days under active exploitation

Citrix patches three new vulnerabilities in its NetScaler lines warning of active zero-day exploitation by an undisclosed threat actor. Read more »
Subscribe to our Newsletter